July 20, 2018 | Javvad Malik

Things I Hearted this Week, 20th July 2018

INFOSEC RECRUITING - IS THE INDUSTRY CREATING ITS OWN DROUGHTWe've all been blasted with many a report that infosec has a massive skills gap. But what if the problem doesn't lie with the lack of skilled professionals, but the hiring process itself?Thomas Fischer makes a compelling argument, using some of his personal recent experiences from both…

July 18, 2018 | James Quinn


This is a guest post by independent security researcher James Quinn.Continuing the 2018 trend of cryptomining malware, I’ve found another family of mining malware similar to the “massminer” discovered in early May.  I’m calling this family ZombieBoy since it uses a tool called ZombieBoyTools to drop the first dll.ZombieBoy, like MassMiner, is…

Get the latest security news in your inbox.

Subscribe via Email

July 17, 2018 | Kate Brew

Threats, Politics, and Cryptocurrency-Mining - Infosecurity Europe 2018 Survey Results

Javvad Malik and the rest of the AlienVault team surveyed 928 participants at Infosecurity Europe 2018 on this topic. Read the full report from Javvad here!Key FindingsLooking forward, cloud security threats are the most concerning external threatInternally, phishing (55%) and ransomware (45%) lead the pack of worries for security departments92 percent would rather pay a subscription fee, allow ads, or…

July 13, 2018 | Javvad Malik

Things I Hearted this Week, 13th July 2018

AT&T To Acquire AlienaultI've covered and speculated, and even advised on security M&A over the years, but it's the first time I've been working in a technology company that has been acquired. It's exciting times, and glad to be part of the journey.AT&T to Acquire AlienVault |…

July 12, 2018 | Amy Pace

Continuous Information Security Monitoring to Combat Continuous Threats

Continuous security monitoring -- a term you’ve heard time and time again. And, while you may be tired of hearing the term, the fact is that continuous monitoring is vital when it comes to mitigating risk, protecting critical assets, and meeting compliance demands.Unfortunately, continuously security monitoring has become more and more of a challenge given that…

July 10, 2018 | GenZ Student

The Terms and Conditions of Internet Privacy for a GenZ Student

We’ve all seen it before; the pop ups of necessary security updates, the horror stories of leaked celebrity pictures by hackers and the infamously long document of God-knows-what followed by “I agree to the following terms and conditions”. These are ever present in our rapidly progressing technological society and continue to characterise the interaction of society…

July 9, 2018 | Javvad Malik

15 Ways to Deal with Badly Written Risks

Every so often, a report gets presented which looks like it was written by the work experience student that was employed by the intern.So what’s the best way to respond? I went on Twitter to ask the opinion of folk who have to deal with this kind of thing on a regular basis, and distilled their wisdom…

July 6, 2018 | Javvad Malik

Things I Hearted this Week, 6th July 2018

Here's an idea.Have convicts in prison manually mine cryptocurrencies.Call it, <wait for it> the blockchain gang!Thank you very much, I'll be here all week.Now on to the serious stuff.10 THINGS TO KNOW BEFORE GETTING INTO CYBERSECURITYYou may know Kevin Beaumont as @GossiTheDog on twitter. He won the 2018 EU blogger awards for…

July 5, 2018 | Danielle Russell

Simplify Compliance Reporting with AlienVault USM Anywhere

USM Anywhere delivers a comprehensive library of predefined compliance report templates for PCI DSS, HIPAA, NIST CSF, and ISO 27001, so you can accelerate your security and compliance programs and be audit-ready faster. It also includes 50+ predefined event reports by data source and data source type, helping to make your daily monitoring and reporting activities more eficient.In addition to predefined…

July 3, 2018 | Javvad Malik

Cloud Based Security

Benedict Evans stated that, the best is often the last. He elaborates by saying, "The development of technologies tends to follow an S-Curve: they improve slowly, then quickly, and then slowly again. And at that last stage, they're really, really good. Everything has been optimised and worked out and understood, and they're fast, cheap and reliable."And while…

June 29, 2018 | Javvad Malik

Things I Hearted this Week, 29th June 2018

It's been an absolutely lovely warm week in London. The sun has been shining, allergies have been high, and kids have been missing out on all the wonders because they're too busy being indoors staring at a mobile device or tablet.Things were very different back in my days... and just like that, I've turned into my…

June 26, 2018 | Mike Duffy

SMBs: 3 Signs It’s Finally Time to Replace Your AntiVirus

Antivirus has been a foundational element of protecting endpoints at small and medium-sized businesses for going on three decades. During that time, the threat landscape has changed dramatically. Thanks to the proliferation and commodification of sophisticated hacking tools, SMBs are now seeing the types of attacks formerly leveled almost exclusively at governments and large enterprises.These new attacks — and…

Watch a Demo ›